what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2011-10-27

Ubuntu Security Notice USN-1249-1
Posted Oct 27, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1249-1 - It was discovered that BackupPC did not properly sanitize its input when processing backup browser error messages, resulting in a cross-site scripting (XSS) vulnerability. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. This issue did not affect Ubuntu 11.10. Jamie Strandboge discovered that BackupPC did not properly sanitize its input when processing log file viewer error messages, resulting in cross-site scripting (XSS) vulnerabilities.

tags | advisory, remote, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2011-3361
SHA-256 | 063eb8c6038da815c5d6dad43a7a7e358f343c718e57b60617c8012eaf8fd1eb
Zero Day Initiative Advisory 11-316
Posted Oct 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-316 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime processes the matrix structures in the 'tkhd' atom for mp4 files. When the matrix structure contains large values a movs instruction can turn the value negative. When Quicktime later uses the function to determine where it should write its data it does check the upper boundaries, but not the lower ones causing a heap buffer underwrite. This can result in remote code execution under the context of the current user.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-3251
SHA-256 | 74594dbdae073622048f6651ace5317e0546240bb0f13a6f484ff95a939e5d92
Zero Day Initiative Advisory 11-315
Posted Oct 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-315 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime decodes flic file. Flic files can contain FLC Delta Decompression block containing Run Length Encoded data. Quicktime fails to correctly checking the decompression size when decoding the RLE data. This allows for a 4 byte overwrite past the end of the buffer which could result into remote code execution under the context of the current user.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-3249
SHA-256 | 3802dfdf1cf93a729f1ba11e5918aa1b86a4e1476352c4beae0112361698747e
Zero Day Initiative Advisory 11-314
Posted Oct 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-314 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple's QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses a specific opcode within a PCT file. When resizing a heap buffer, the application will use a signed word read from the file to calculate the resulting size. This can be used to force the target buffer to be of an undersized length. Usage of this buffer will result in a buffer overflow in the context of the application.

tags | advisory, remote, overflow, arbitrary
systems | apple
advisories | CVE-2011-3247
SHA-256 | cc09b6342d4553ebc78dcd6858afd62878e46f1f87c465f70b1ae1679eb9abfe
Zero Day Initiative Advisory 11-313
Posted Oct 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-313 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Quicktime decodes flic file. Flic files can contain FLC Delta Decompression block containing Run Length Encoded data. When Quicktime tries to decompress this data it reads a user supplied RLE Packet count field from the file and uses that as loop counter. A high value for this field will cause Quicktime to write outside previously allocated memory which could result into remote code execution.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-3223
SHA-256 | 45489e6bcd5489bd68ed6bfde99280dedd3b41ee95eb68978163dd7dddbf7411
Xorg Permission Change
Posted Oct 27, 2011
Authored by vladz

Xorg versions 1.11.2 and below suffer from a permission change vulnerability that allows a local user the ability to set an arbitrary file to 444.

tags | exploit, arbitrary, local
SHA-256 | 9f6009b727030f6089ce212fb9833092feb2cd7c92c9d65e65e274472ecb43ce
Zero Day Initiative Advisory 11-312
Posted Oct 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-312 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses the atom hierarchy within a QuickTime movie file. In a certain situation the application will pass execution to another function for handling the atom, however, will pass the incorrect number of arguments. Due to this, a variable will be treated as a pointer. This can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
systems | apple
advisories | CVE-2011-3221
SHA-256 | cb365aed44c81961888502d4e300903ac4ba55d40337e597ccdb589e14a421f0
Zero Day Initiative Advisory 11-311
Posted Oct 27, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-311 - This vulnerability allows remote attackers to potentially disclose memory addresses on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how QuickTime.qts parses a data handler in specific atom within a .mov file. The application will utilize a string length to copy data into an heap buffer, if the string is of zero-length, the application will fail to copy anything and then proceed to use the uninitialized buffer as a string.

tags | advisory, remote
systems | apple
advisories | CVE-2011-3220
SHA-256 | 4682f8dd91fca2078cf6708e8f7ebb6201141a50fc68df2e53c92a85f3d4035a
OpenCart 1.5.1.1 HTTP Response Splitting
Posted Oct 27, 2011
Authored by indoushka

OpenCart version 1.5.1.1 suffers from a CRLF injection / HTTP response splitting vulnerability.

tags | advisory, web
SHA-256 | 834045fa71657a4a86151bdf755c6d75625809e43314f881488714917eb293e0
Facebook.com Attach EXE Bypass
Posted Oct 27, 2011
Authored by Nathan Power

Facebook.com suffers from a bypass vulnerability where an executable can be attached to a message if a spaced is added to the name.

tags | advisory, bypass
SHA-256 | d50f0c387bdb7f361f67403ec07249d408f5a19eed5358e240b208741277268f
Debian Security Advisory 2329-1
Posted Oct 27, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2329-1 - Bartlomiej Balcerek discovered several buffer overflows in torque server, a PBS-derived batch processing server. This allows an attacker to crash the service or execute arbitrary code with privileges of the server via crafted job or host names.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2011-2193
SHA-256 | 5f42437f7d36f6cd8bdb547930c295a44714e4c3fb860357704edd6e75e86fbf
Toshiba eStudio Printer Information Leakage
Posted Oct 27, 2011
Authored by Deral Heiland | Site foofus.net

The Toshiba eStudio multifunction printer suffers from an information leakage vulnerability as passwords can be extracted in plaintext from the html source code of various configuration pages.

tags | exploit
SHA-256 | 5734383d4ee705db601bc8d3d5e3c2dd43c7d59704ae77a50bf1ce5366dd57bc
Cisco Unified Contact Center Express Directory Traversal
Posted Oct 27, 2011
Authored by Digital Defense, r@b13$ | Site digitaldefense.net

The default deployment of Cisco Unified Contact Center Express (UCCX) system is configured with multiple listening services. The web service that is listening on TCP port 9080, or on TCP port 8080 in versions prior to 8.0(x), serves a directory which is configured in a way that allows for a remote unauthenticated attacker to retrieve arbitrary files from the UCCX root filesystem through a directory traversal attack. It is possible for an attacker to use this vector to gain console access to the vulnerable node as the 'ccxcluster' user, and subsequently escalate privileges.

tags | advisory, remote, web, arbitrary, root, tcp
systems | cisco
advisories | CVE-2011-3315
SHA-256 | 4f61867467d9f947166505f70c2306db6ef9f3380f5efdf8445bb8695e519d32
GTA SA-MP server.cfg Buffer Overflow
Posted Oct 27, 2011
Authored by Silent_Dream | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in GTA SA-MP Server. This buffer overflow occurs when the application attempts to open a malformed server.cfg file. To exploit this vulnerability, an attacker must send the victim a server.cfg file and have them run samp-server.exe.

tags | exploit, overflow
SHA-256 | 6516b83685589a1ead2d78e1fafcac820b7f9e19416217a6dda64bcf91cceef6
SANS AppSec Summit 2012 Call For Papers
Posted Oct 27, 2011
Site sans.org

The SANS AppSec Summit Call For Papers has been announced. This event will take place in Las Vegas, Nevada from April 30th through May 1st, 2012.

tags | paper, conference
SHA-256 | f85366a74c6a05d10f5286c3687ce6acd52adea9f9b93742ae371c8b746fc1e7
phpScheduleIt PHP reserve.php start_date Parameter Arbitrary Code Injection
Posted Oct 27, 2011
Authored by EgiX, juan vazquez | Site metasploit.com

This Metasploit module exploits an arbitrary PHP code execution flaw in the phpScheduleIt software. This vulnerability is only exploitable when the magic_quotes_gpc PHP option is 'off'. Authentication is not required to exploit the bug. Version 1.2.10 and earlier of phpScheduleIt are affected.

tags | exploit, arbitrary, php, code execution
advisories | CVE-2008-6132, OSVDB-48797
SHA-256 | 5d5d2dee3205b21a8812ad1ba723eaf15edbd136751c83c17084738dd1505d2a
eFront 3.6.10 Build 11944 Shell Upload / Code Execution / SQL Injection
Posted Oct 27, 2011
Authored by EgiX

eFront versions 3.6.10 build 11944 and below suffer from code execution, authentication bypass, shell upload, and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, code execution, sql injection
SHA-256 | a2df7a32a7dd4ae0a9bc4dbd2e2499dc496f68c261d43e949234ee9dc33f4c05
OWASP Mantra c0c0n 11 / AppSecLatam 11 0.71 Beta
Posted Oct 27, 2011
Site getmantra.com

OWASP Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers,security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software. This is the platform independent release.

tags | tool, web
SHA-256 | 7ab4f46f7750e54e54d0f6721053ab9635778e313da8e2369ad9bfd717a28242
Secunia Security Advisory 46347
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cyrus-imapd. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, suse
SHA-256 | ecdc38a1858cfc80ebd0fd2d88975201a6eabffa4d1e52e06056ea632e598099
Secunia Security Advisory 46531
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Presta2PhpList module for PrestaShop, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 77f4b16edfaa37a9ede9dc3edde8ad4a5e6a509ccfb5b73a2b8e184c859703d8
Secunia Security Advisory 46584
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | 7215d9d5d7593fcc5bf61a6e25712d3007f4b0347d4ff60d6a0d33e9d53892a0
Secunia Security Advisory 46596
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 1be98bb677f07793f9ed3b84888b8455beadff4d4665644c71dc142b4c0d43d2
Secunia Security Advisory 46574
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere ILOG Rule Team Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 9761657bbf78b64616e008ceeceeb7473ac5d94c05facbac8c07bb1667ca93cd
Secunia Security Advisory 46581
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for mod_authnz_external. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
systems | linux, gentoo
SHA-256 | 0bb4ab755cda9dc64d36b35551b7c12c78bcc47295700ff717e7b6bc6714819a
Secunia Security Advisory 46592
Posted Oct 27, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for kde4libs. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, ubuntu
SHA-256 | 2e9fef9bece728d9279d0097f42e7ca3e1b5e78bfbf4297c80d46a5de43067fe
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close